A 3-D Encryption Technique Using Computer-Generated Hologram

被引:0
|
作者
Zhang, Zhou [1 ,2 ]
Liu, Guo-dong [1 ]
Gao, Yi-qing [2 ]
Hu, Xiao-qiang [1 ]
Wang, Sheng-qian [1 ]
机构
[1] Nanchang Hangkong Univ, Key Lab Nondestruct Test, Minist Educ China, Nanchang, Jiangxi, Peoples R China
[2] Normal Univ, Jiangxi Sci & Technol, Key Lab Photoelect & Commun, Nanchang, Jiangxi, Peoples R China
关键词
D O I
10.1109/ICESS.Symposia.2008.41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The techniques of hologram for encryption and decryption have been widely researched and applied. Almost all the information of encryption is 2-D image. Parameters (wave length, recording distance, incidence angle, etc.) are regarded as the encoded keys for encryption and decryption. In the paper a novel way to encrypt 3-D information is proposed, which is based on technique of virtual optics. A new encoded key is introduced into security hologram, the size of 3-D object, which may play an important role for better protection against counterfeiting. Furthermore, a new image quality assessment is proposed to estimate the reconstruction 3-D object of CGH called Modified PSNR (peak signal-to-noise ratio). Simulation experiments show that CGH is an effective encryption technique, and Modified PSNR is a proper definite quantity analysis method for 3-D imaging.
引用
收藏
页码:3 / +
页数:3
相关论文
共 50 条
  • [1] 3D image encryption based on computer-generated hologram in the fractional Fourier domain
    Piao, Mei-Lan
    Piao, Yan-Ling
    Kim, Nam
    [J]. PRACTICAL HOLOGRAPHY XXXIII: DISPLAYS, MATERIALS, AND APPLICATIONS, 2019, 10944
  • [2] Computer-generated Hologram for 3-D Scene from Multi-view Images
    Chang, Eun-Young
    Kang, Yun-Suk
    Moon, KyungAe
    Ho, Yo-Sung
    Kim, Jinwoong
    [J]. THREE-DIMENSIONAL IMAGING, VISUALIZATION, AND DISPLAY 2013, 2013, 8738
  • [3] 3-D COMPUTER-GENERATED MOVIES USING A VARIFOCAL MIRROR
    RAWSON, EG
    [J]. APPLIED OPTICS, 1968, 7 (08): : 1505 - &
  • [4] COMPUTER-GENERATED HOLOGRAMS OF 3-D OBJECTS
    LESEBERG, D
    [J]. HOLOGRAPHIC OPTICS II : PRINCIPLES AND APPLICATIONS, 1989, 1136 : 202 - 207
  • [5] Multiple watermarking technique based on computer-generated hologram
    [J]. Su, P. (su.ping@mail.sz.tsinghua.edu.cn), 1600, Chinese Academy of Sciences (21):
  • [6] Optical image encryption and authentication using phase-only computer-generated hologram
    Wang, Wenqi
    Wang, Xiaogang
    Xu, Bijun
    Chen, Junlang
    [J]. OPTICS AND LASERS IN ENGINEERING, 2021, 146
  • [7] An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map
    Ren, Hui
    Wang, Jun
    Wang, Qiong-Hua
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2018, 2018
  • [8] THE MAKING OF A COMPUTER-GENERATED HOLOGRAM
    Zeitner, Uwe D.
    Banasch, Michael
    Kley, Ernst-Bernhard
    [J]. PHOTONICS SPECTRA, 2008, 42 (12) : 58 - 61
  • [9] Computer-generated hologram statistics
    Lopez-Mariscal, Carlos
    [J]. LASER BEAM SHAPING XI, 2010, 7789
  • [10] Computer-generated image hologram
    Takeshi Yamaguchi
    Hiroshi Yoshikawa
    [J]. Chinese Optics Letters, 2011, 9 (12) : 24 - 27